🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to create a step-by-step network access checklist to verify and control/limit external system use β€” FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.III (Code 546)

A practical, step-by-step guide to building a network access checklist that verifies and restricts use of external systems to meet FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.III (Code 546).

β€’
April 01, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, implementable step-by-step checklist you can use to verify and control or limit external system use in order to meet FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.III (Code 546) requirements β€” focused on small business realities and the "Compliance Framework" environment. It translates the control's intent into concrete tasks, technical settings, and organizational steps so you can reduce risk and demonstrate compliance during assessments.

Why this control matters for Compliance Framework

The control requires verifying and limiting use of external systems that interface with your environment (cloud services, personal devices, partners' systems) to ensure controlled unclassified information (CUI) and other sensitive data remain protected. For small businesses operating under FAR 52.204-21 and CMMC 2.0 Level 1, failure to verify or limit external system use increases the chance of data leakage, supply-chain compromise, and contract non-compliance β€” which can result in lost contracts, fines, or mandatory remediation. In the Compliance Framework context, this control maps to access management, monitoring, and least-privilege enforcement practices.

Step-by-step checklist (high-level flow)

Step 1 β€” Inventory external systems and entry points

Create a one-page register that lists every external system or service that users or devices can reach: SaaS apps (Box, Google Workspace, MS 365), vendor portals, contractor networks, VPNs, remote desktops, unmanaged cloud accounts, and personal devices used for work. For each entry include: owner, purpose, data classification it handles, authentication method used (SAML/MFA, username/password), and connection vector (web, VPN, API). Tools: manual spreadsheet for very small shops or automated discovery using firewall logs, proxies, or cloud access security broker (CASB) telemetry for midsize firms.

Step 2 β€” Categorize and apply policy templates

Classify each external system as "Allowed β€” Approved", "Allowed β€” Restricted", or "Blocked/Disallowed" based on business need and whether the system meets your security baseline. Define policy templates: e.g., Approved SaaS must support SSO + MFA + vendor SOC2; Restricted systems require manager approval and session monitoring; Blocked systems include consumer file-sharing services or unmanaged cloud storage. Record the policy rationale to support audit evidence under the Compliance Framework.

Step 3 β€” Enforce technical controls (network and endpoint)

Translate policy into enforcement: create firewall/NGFW rules and egress ACLs to only allow connections to approved hosts and FQDNs, enable DNS filtering (Cisco Umbrella, NextDNS) to block disallowed domains, and configure proxy allowlists for web traffic. Implement network segmentation/VLANs so devices that may access external systems are isolated from systems that hold CUI. Use Network Access Control (802.1X + RADIUS or NAC solutions like PacketFence) and an MDM (Intune, Jamf) or EDR (Microsoft Defender for Endpoint, CrowdStrike) to enforce device posture checks before granting network access.

Step 4 β€” Strong authentication and session controls

Require MFA on all accounts that access external systems; where possible enforce SSO with conditional access (e.g., Azure AD Conditional Access) to block legacy auth, untrusted locations, or risky sign-ins. For privileged or sensitive remote access, require client VPN with certificate-based authentication and disable split-tunneling. Configure session timeouts, and where feasible use just-in-time access or role-based access control so external system use is minimized and logged.

Step 5 β€” Logging, monitoring, and periodic verification

Ensure all external-access events are logged: VPN connection logs, SSO/auth logs, firewall egress logs, proxy web logs, and endpoint telemetry. Forward logs to a central log collector or SIEM (cloud options like Azure Sentinel, Elastic, or lightweight Wazuh for small shops). Define verification checks: weekly review of new external domains accessed, monthly reconciliation of inventory vs observed connections, and quarterly access recertification for third parties. Retain evidence (screenshots, exported logs, signed approval forms) to demonstrate compliance to auditors.

Practical small-business scenarios and examples

Example 1: A 15-person contractor uses Microsoft 365 plus a subcontractor-hosted design tool. Implementation: add the design tool to your inventory, require the subcontractor to use SSO and MFA, create a firewall rule to allow only the tool’s IP ranges or FQDN, and require the design tool owner to sign a data handling attestation. Example 2: A remote employee wants to use a personal Google Drive for sharing drafts. Policy: mark consumer cloud storage as "Blocked", instruct the employee to use approved OneDrive with company controls, and enforce the decision using DNS/proxy blocking plus an HR exception process if a legitimate need arises.

Compliance tips and best practices

Keep the checklist short, actionable, and version-controlled. Use templates for "approval requests" (who, why, data types, mitigation). Automate where you can β€” e.g., cloud identity logs to alert on new third-party OAuth app grants, firewall scripts to push FQDN allowlists, or MDM to block unmanaged devices. Maintain a documented exception workflow with time-bounded approvals and compensating controls (additional monitoring, data loss prevention policies). Train staff quarterly on which external systems are approved and how to request exceptions.

Risk of not implementing this control

Without a verifiable checklist and enforcement, external systems can become blind spots: unmanaged cloud storage can leak CUI, vendor systems with weak controls can be pivot points for attackers, and personal devices can introduce malware. From a compliance viewpoint, absence of documented verification and restriction processes typically results in failed assessments under FAR clauses or CMMC requirements, potential contract penalties, and costly reactive incident response and notifications.

Summary: Build a pragmatic checklist that starts with inventory, applies clear categorization, enforces technical controls (firewall rules, NAC, MFA, device posture), and implements logging plus regular verification; tailor the steps to your small-business environment, automate evidence collection, and document exception handling. Following this approach will meet the intent of FAR 52.204-21 / CMMC 2.0 AC.L1-B.1.III (Code 546) and materially reduce the risks from external system use while keeping compliance evidence auditable and scalable.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes